Optimizing resource consumption by the application

This section contains recommendations of Kaspersky experts on configuring Kaspersky Endpoint Security to optimize system resource consumption. The application running with default settings may impact system performance on some devices because of the same resources being used by your applications and Kaspersky Endpoint Security. To avoid performance degradation, we recommend following the steps in this section after installing the application and completing the initial configuration.

We recommend the following steps to optimize system resource consumption by the application:

  1. Put your devices in administration groups according to the role of each device in the infrastructure.

    Take an inventory of devices and the functions they perform and put them in different administration groups based on those functions. For example, you can have an administration group with web servers, another administration group with database servers, a third administration group with user workstations, and so on.

  2. Configure the application for typical server roles.

    Configure the application on devices according to their role in the infrastructure as recommended.

  3. Analyze the performance on pilot devices.

    Pick 1 or 2 pilot devices in each administration group. For each device, analyze how Kaspersky Endpoint Security uses system resources and how this impacts the performance of installed applications.

  4. Configure the application on pilot devices based on the results of performance analysis.

    If the performance of applications is significantly degraded or the amount of system resources consumed by Kaspersky Endpoint Security is critical for the operation of the operating system and applications, configure File Threat Protection and scan tasks as recommended.

    You can also optimize the Web Threat Protection and Network Threat Protection‎ components.

  5. Update the configuration of the application on all devices.

    If the above steps helped improve performance on your pilot device, make the same changes on other devices of the same type.

In this Help section

Recommendations for typical server roles

Analysis of application performance on the device

Recommendations for File Threat Protection and scan tasks

Recommendations for the Web Threat Protection and ‎Network Threat Protection tasks

Page top